Man in the middle (MITM) attacks are the attacks which are carried out by intercepting a communication between two systems. In this attack, the attacker acts as a proxy in between the victim and server (or router). Hence the information which flows to and from victim goes through the attacker. This interception allows attacker to view and even change the information of incoming and outgoing requests.In this article I discuss the step by step process for carrying out a MITM attack.
Once we know how a MITM is executed, we can figure out ways to prevent it from happening on us. With most of us working from our home now, security becomes far more critical with the onus of securing our networks on us.
Have a good weekend!